Category Archives: Mind Mapping

Certified Ethical Hacker – Module 5 – System Hacking Mind Map

Here is the fifth Mind Map in the Certified Ethical Hacker CEH series from MindCert.com.

This Mind Map covers System Hacking. There are nine sections to this Mind Map.

They are: Remote Password Guessing, Eavesdropping, Denial of Service, Privilege Escalation, Keystroke Loggers,  Password Cracking, Covering Tracks,  Remote Control, and Covering Tracks.

This is quite a large Mind Map as you can see and it covers a lot of topics. As normal, the subjects are covered and then associated tools are provided complete with links that show where to download the tools from. All of the tools are what are in the CEH syllabus and I would recomend you looking at each one of these tools in order to ensure you know what they do, and how they do it.

The CEH exam has a large focus on the tools you use so take advantage of these links and install the tools to play with. You cannot beat first hand experience.

As always, please feed back comments about the Mind Map and follow this link to download it.

    Online Mind Mapping – MindMeister.com

    online mind mappingI was a private beta tester for MindMeister and I have been using it for some development planning for RandomStorm, one of my new business ventures.

    I must say that I am very impressed with what has been achieved by MindMeister.

    Now, it is pretty obvious that I am a huge fan of Mind Mapping. What MindMeister gives you is an online system, in true Web2.0 style for creating and managing Mind Maps.

    Where MindMeister really comes into it’s own is the online collaboration. For example, seven people from RandomStorm have got access to the development Mind Map that I have created. I simply created this Mind Map, and then I shared the Map with the other users. Two of the other employees were already MindMeister users and five were not. The five that were not were first sent an invitation to join MindMeister and then they are sent a link where they can join and share my map. I can collaborate with all of these people at once and the online collaboration is really cool, being able to see other people editing the Mind Map in real time.

    Again, what a fantastic tool for group collaboration. You can even Skype call or Skype IM from directly within the Mind Map to other users of the Mind Map.

    The AJAX interface of MindMeister is great. Amazing how far technology has come in order to facilitate something like this. Sure, there are not as many features as MindManager from MindJet or the other desktop based Mind Mapping applications that I would still use on my Mac. However, for a free online collaboration tool, keeping with the Mind Mapping tradition then MindMeister blows the socks of any other online tool I have used and it safely in place for my list of applications that will become my corporate standard.

    Visit the site now, and see why I am ranting on about how cool this is 🙂

    Certified Ethical Hacker – Module 4 – Enumeration Mind Map

    Here is the fourth Mind Map in the Certified Ethical Hacker CEH series of Mind Maps aimed to help you pass the exam by improving your study retention, a lot more than practice questions do.

    This Mind Map covers Enumeration, which is the fourth module in the CEH. Enumeration is where you use active connections to identify resources on a given host. These resources may be network resources, users and groups, as well as applications and banners.

    This Mind Map covers the main forms of Enumeration such as NetBIOS EnumerationNull Session Enumeration, SNMP Enumeration as well as Active Directory Enumeration. Sample tools that can be used to Enumerate in each instance are also provided.

    As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

    Proceed to download the Mind Map on Enumeration for the Certified Ethical Hacker.

    CISSP Mind Map – Physical Security

    CISSP Physical SecurityI am happy to bring you the fourth Mind Map that covers the CISSP Certification. We have already brought you the Mind Map for BCP, Access Control Systems, and Application Development.

    This Mind Map covers the Physical Security Domain out of the Common Body of Knowledge. Yep, this is the famous domain that everybody jokes about when studying for the CISSP. Guard Dogs, Security Guards, Security Lighting, it is all in this domain.

    When taking the test, this domain was real easy. Just remember the values that are depicted in the Mind Map as well as the pros and cons of each type of Physical control and I am sure you will do just fine.

    I have another six Mind Maps to do and I am just spacing them out, would love to hear some feedback. Lots of people download my Mind Maps but not many comment. Are they good? Any suggestions for improvements? Any suggestions for other Mind Maps? Anyway, until next time..

    Please Download and Enjoy this Mind Map.

    Mind Jet Recommended Blog

    MindJet BlogI am happy to say that MindCert.com has been recommended by Mind Jet on their official Mind Jet Blog as a Recommended Mind Mapping Blog.

    This Mind Map is a collection of the best community blogs on Mind Mapping and also people who use the Mind Manager Application.

    As I have stated before, I use Mind Manager 6 for my Mac as my main Mind Mapping application and I also own Mind Manager 6 for Windows as well. They are awesome applications and Mind Jet are now getting involved more in the community and providing some great resources.

    Be sure to check out the Mind Jet recommended Mind Manager blogs and follow the URLs to the other blogs about Mind Mapping.

    Certified Ethical Hacker – Module 3 – Scanning Mind Map

    Mind Map CEH ScanningI am pleased to bring you the next Mind Map for the Certified Ethical Hacker.

    This Mind Map covers module 3 of the CEH curriculum. This is Scanning. This Mind Map and module covers the detection of live systems on a network as well as the detection of services on those systems. This is also known as port scanning, and one of the best port scanning tools is Nmap. Nmap is covered in depth within this Mind Map along with the command line options for performing different scans with it. As well as Nmap, other port scanning tools are reviewed as well as direct links to download them.

    As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

    Proceed to download the Mind Map on Scanning for the Certified Ethical Hacker.

    MindJet Mind Manager 7 Announced

    MindManager 7MindJet have today announced the latest update to their MindManager Mind Mapping application.

    I have been using Mind Manager as my main Mind Mapping tool ever since I discovered it. I was involved in Mind Mapping long before the advent of computer based Mind Mapping applications but I soon found MindManager to be the most capable application.

    Initially, I used MindManager on my PC with one of the very early versions. The 6.0 release was quite considerable as far as usability and it also brought support for Mac OS X. As I switched to the Mac around 18 months ago, this was a great relief. Upon switching, the only application that I missed from Windows was MindManger so I had to use MindManager from within a Windows Virtual machine on my Mac.

    I was a beta tester for the Mac version and as soon as it came out, I bought it. The Mac version is not as fully featured as the Windows version but to be honest, it does 100% of what I need it to do and then some more!

    Here is the lowdown on the new features of Mind Manager Pro 7.

    MindManager Pro 7 for Microsoft Windows features a new interface based on the Microsoft Office Fluent™ UI – designed to enable people to quickly discover and utilize more capabilities within MindManager. New usability enhancements include easier browsing within the Ribbon which has logically grouped tabs, contextual tabs for better navigation, new map styles for faster formatting and enhanced ScreenTips, just to name a few.

    The Mac version has the following features.

    MindManager 7 Mac is the first upgrade to Mindjet’s successful Macintosh product, released in 2006. MindManager 7 Mac offers significant enhancements to improve ease of use and functionality. These include a powerful new way to select topics by rules, which can be saved and applied as filters; printing enhancements that allow users to print large maps across multiple pages and add headers and footers and borders to printed maps; enhanced import and export capabilities, including OPML, HTML, Text Outline and more. Mac version users can now instantly view maps in a new Outline View. There are also significant image library enhancements, allowing users to find images quickly using keywords or a zoom slider to enable multiple or up-close image views. MindManager 7 Mac also includes a new timer to keep meetings and brainstorming sessions on track and improved background image handling and main topic alignment.

    I was a beta tester for both the Windows and Mac versions of MindManager 7 and I can recommend you to get it when it comes out. Release date is the 30th May 2007.

    CISSP Mind Map – Business Continuity Planning and Disaster Recovery Planning

    MindCert CISSP BCPThis is the third Mind Map out of ten in the CISSP Series.This Mind Map covers the Business Continuity Planning and Disaster Recover Planning domain on the Common Body of Knowledge (CBK).

    This domain addresses the important of planning for business continuity and or a disaster. The domain covers the type of planning and suggests steps you should take to ensure that roles and responsibilities are allocated to staff members and that everybody knows what the plan is in the event of a disaster to cause the minimum impact to the operational effectiveness of an organization.

    As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

    The Mind Map can be downloaded HERE.

    Certified Ethical Hacker – Module 2 – Footprinting Mind Map

    Hacking FootprintingI am happy to provide the second Mind Map for the Certified Ethical Hacker (CEH).

    The second Mind Map from MindCert.com covers Footprinting. Footprinting is the initial reconnaissance that a hacker carries out in order to gleam information about the target of evaluation.

    The type of information that is obtained through footprinting is normally in the public domain so this is classed as passive reconnaissance as you do not have to do anything active, against the target of evaluation at this point.

    I hope you find this Mind Map useful, there are a lot more to come.

    The Mind Map can be DOWNLOADED HERE

    CISSP Mind Map – Application and Systems Development

    This is the second Mind Map out of ten in the CISSP Series.

    This Mind Map covers the Application and Systems Development domain on the Common Body of Knowledge (CBK).

    This domain addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.

    As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

    The Mind Map can be downloaded HERE.